资源说明:bt5中文使用教程
第一章. 文档管理 ......................................................................................................................... 8
第二章. BackTrack 介绍 ............................................................................................................ 10 0 o/ v' e( c! i: N; H: }5 W
第一节. backtrack发展简介 ............................................................................................... 10
第二节. 同类系统介绍 ........................................................................................................ 14
第三节. 下载BackTrack ..................................................................................................... 18 6 C: m) g _9 s" c/ R; V
第三章. BackTrack 安装 ............................................................................................................ 21 5 {) F( C. }# _6 X# K9 G7 j2 E3 B
第一节. 光盘启动 ................................................................................................................ 21
第二节. 硬盘安装 ................................................................................................................ 25
第三节. U盘安装1——UNetbootin ................................................................................... 33 3 G6 q: E, P( |
第四节. U盘安装2——Linux Live USB creator ............................................................... 35 & K( d+ ?4 Z- z6 k! N5 g1 p; m
第五节. U盘安装3——Persistent ...................................................................................... 37
第六节. 升级安装最新版 .................................................................................................... 43 " j1 |# M2 }! ?
第七节. 更换桌面背景 ........................................................................................................ 45 & L4 C+ w/ G% m1 a5 M. z- ]; z' E
第八节. 从ubuntu到 BackTrack ........................................................................................ 47 # O! t( c5 l4 ?+ _
第四章. ARM平台安装 ............................................................................................................. 47 " K, w* x5 p/ A5 G [ ^3 K
第一节. ARM介绍 .............................................................................................................. 47
第二节. Nokia N900安装backtrack ................................................................................... 48
第三节. motorala手机安装 backtrack ................................................................................ 52 + X' w% H: v% L- b7 O7 f4 h: Z! Y
第四节. 索爱Xperia X10手机安装 backtrack ................................................................... 53 6 H5 R9 g: m8 i# ?0 I
第五节. Motorola Xoom平板电脑安装 backtrack ............................................................ 57 : a0 G0 ?, ` X7 E( {
第五章. Backtrack虚拟化 .......................................................................................................... 61
第一节. VMware安装 backtrack ........................................................................................ 61
第二节. 自动安装Vmware Tools ....................................................................................... 65
第三节. 手动安装Vmware Tools ....................................................................................... 69 ) D% O/ G! T1 c! m0 e
第四节. BackTrack 安装 VMware Workstation .................................................................. 72 - f9 P' s& q0 B& s
第五节. Backtrack安装 Virtual Box ................................................................................... 73 y+ {% o: r) J8 h7 z9 F/ p
第六节. Virtual Box 安装BackTrack ................................................................................. 74 ! X2 b4 k e0 @& x t! `4 ^4 p
第六章. BackTrack上网 ............................................................................................................ 76 & e" R; ~! w- Y- I6 \- ] {
第一节. 自动获取 IP ........................................................................................................... 76 8 G0 P; H2 D; Q! g$ k# l% I7 X
第二节. 临时设置 IP地址 .................................................................................................. 79 8 d, A9 m3 R4 w5 B
第三节. 设置静态 IP地址 .................................................................................................. 79
第四节. ADSL拨号设置 .................................................................................................... 82 # M; ]6 _$ s2 [/ v
第五节. 无线网络设置 ........................................................................................................ 87
第七章. BackTrack 汉化 ............................................................................................................ 91 1 W8 R0 h+ M" {; b( v
第一节. BackTrack KDE汉化 ........................................................................................... 91 ) r7 P- |( y5 X1 h! w$ h3 p; r
第二节. BackTrack GNOME汉化 ..................................................................................... 96
第三节. 系统语言环境设置 .............................................................................................. 101 _3 l9 E5 W5 |% H3 D7 @$ w
第四节. 安装中文输入法 .................................................................................................. 102 9 V7 s! D o5 t3 q
第五节. 云输入法 .............................................................................................................. 104 F* q) c' r/ u- k0 i* L
第六节. 更新Firefox版本 ................................................................................................ 104
第八章. Linux基础 .................................................................................................................. 106 # X1 |- w7 K& a' S
第一节. 常用的apt命令 ................................................................................................... 106 V ?) [" B" U$ N5 Y# m! ~% o
第二节. 常用的dpkg命令 ................................................................................................ 107 7 ^' L& A" d2 x, b4 [
第三节. 如何查找帮助 ...................................................................................................... 108
第九章. BackTrack基本使用 .................................................................................................. 108
第一节. 更改root密码 ..................................................................................................... 108
第二节. 创建普通用户 ...................................................................................................... 109
第三节. Backtrack 5 KDE更改屏幕分辨率 .................................................................... 111 ! A* A# w: ~5 C; P
第四节. Backtrack 5 GNOME更改屏幕分辨率 .............................................................. 113 " M3 D9 v) Q5 z- m6 }
第五节. 解决GPG错误 .................................................................................................... 115
第六节. 解决启动不了图形界面的问题 .......................................................................... 115
第七节. BackTrack 安装 QQ ............................................................................................ 116 2 Z7 C0 ^; w' c1 H
第八节. Rebuilding the bt4 ISO ...................................................................................... 117 * e" V# j7 J' @0 t* z6 ^
第九节. Rebuilding the BT5 ISO ...................................................................................... 122
第十节. 更改桌面文件夹 .................................................................................................. 122
第十一节. 准备内核头文件 .................................................................................................. 123 $ k% v+ u/ Y8 l4 Y8 z# b
第十二节. 更新backtrack ..................................................................................................... 126 % y) t5 r# f6 l/ A N$ j& Q, x
第十章. Information Gathering信息搜集工具 ........................................................................ 128 ( ], F# D5 d9 `$ i/ k+ V% i7 K
第一节. Network analysis- DNS analysis .......................................................................... 128 , }+ C0 F% P% l* C2 X' u
1. DNSWalk .................................................................................................................... 128
2. DNSTracer .................................................................................................................. 129 5 @* c0 [+ p5 @1 x/ j
3. DNSEnum ................................................................................................................... 129 1 A% E- T1 l: u
第二节. Network analysis- Identify live hosts................................................................... 131
1. 0trace ........................................................................................................................... 131 1 t- v) ^/ y ?
2. Fping ........................................................................................................................... 131
第三节. Network analysis- Route analysis ....................................................................... 132 * n$ t* L4 z" `" e# _' ^# }! s
1. Netenum ...................................................................................................................... 132 ! I& Q8 O- C- W- z; Y- R, o
2. Protos .......................................................................................................................... 133 3 Z3 B* U) X2 @! I* A4 \
第四节. Network analysis- Network scanners ................................................................... 134 4 c- C' c, c4 Z) J
1. Autoscan...................................................................................................................... 134
2. NMAP ......................................................................................................................... 138 8 P0 T. q$ K& `* V, c, T
3. Zenmap........................................................................................................................ 138 ' [* K6 _- O6 B9 s2 {( M
4. Unicornscan ................................................................................................................ 139 5 R: i5 q% `+ c1 M3 W
第五节. Network analysis- SSL Analysis .......................................................................... 141
1. Sslscan ......................................................................................................................... 141 0 x5 @ v V7 N% G
第十一章. Vulnerability Assessment漏洞检测工具 ................................................................... 144
第1节. Network assessment ............................................................................................. 144 + P K" f8 s) C2 E7 d! Q7 H$ M! R3 s
1. Cisco auditing tool ...................................................................................................... 144 + z7 H. W7 a& q, V, A8 ]2 I
2. Cisco global exploiter ................................................................................................. 144 8 Z. N5 z. L# q
3. Cisco OCS mass scanner............................................................................................. 145 % j' P6 p o7 k1 Y* W9 Z
4. Cisco password scanner .............................................................................................. 145 & l- x3 J$ G' G8 Y& b. ^
5. Copy router config ...................................................................................................... 145 4 c+ [4 R2 K& m: b; ~- K/ {" C3 t
6. Merge router config..................................................................................................... 145
/ w6 l' h8 e/ S# u @ j1 M8 K: s8 K1 j
第2节. Vulnerability Scanners漏洞扫描工具 ................................................................ 145 # [8 l6 f& t5 E0 \4 S
1. Nessus ......................................................................................................................... 145
2. OpenVas ...................................................................................................................... 149 , a ~. ^% ~- o% o
第十二章. Exploitation Tools漏洞利用工具 .............................................................................. 157
第一节. Network exploitation tools ................................................................................... 157
第二节. Wireless exploitation tools ................................................................................... 158 # Q5 p3 V: d3 s7 m& D
1. WEP密码pojie ........................................................................................................... 158
2. WPA密码pojie(WPA TKIP PSK) ......................................................................... 159 * b6 \; j0 C% h. s" t
3. WPA 2 密码pojie(WPA CCMP PSK) .................................................................... 159 8 ?# ?2 J5 ^9 [
第三节. Social engineering tools ....................................................................................... 163
第十三章. Privilege Escalation权限提升 .................................................................................... 163
第1节. Sniffer ................................................................................................................... 163
1. ettercap ........................................................................................................................ 163 1 S* V" Q3 y# S0 x' _$ d% g. z
第2节. BackTrack 启用 Cuda .......................................................................................... 166
第十四章. Maintaining Access维护访问工具 ............................................................................ 169
第十五章. Reverse engineering逆向工程工具 ........................................................................... 170 ; m$ h5 G( x; T, D4 J; E
第十六章. RFID工具 ................................................................................................................... 170 J# P& W7 S( u! c" c
第十七章. Stress Testing压力测试工具 ...................................................................................... 171
第十八章. Forensics取证工具..................................................................................................... 171 # B3 @% q2 e2 @6 m
4 C7 C$ c) e: a: y
第1节. 取证应用 .............................................................................................................. 171
第十九章. Reporting Tools报告工具 .......................................................................................... 173 2 ?* [/ a/ J9 p+ x. r
第二十章. Services各种服务 ...................................................................................................... 174
第一节. 启动SSHD服务 .................................................................................................. 174
第二节. 启动VNC服务 ................................................................................................... 174 $ l1 C h$ I2 O0 F8 Y
第三节. 启动TFTP服务................................................................................................... 174 3 J8 z7 L$ K/ @7 I
第四节. 启动其他服务 ...................................................................................................... 174 4 m4 T- ?6 }( s, F- e1 ?! }$ A
第二十一章. Miscellaneous杂项工具 ...................................................................................... 175 : P$ @0 i! V- y
第二十二章. 常见的问题 .......................................................................................................... 176
本源码包内暂不包含可直接显示的源代码文件,请下载源码包。